CROSS-REFERENCE TO RELATED APPLICATIONSThe entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 16/557,753; filed 2019 Aug. 30; and entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS.
The entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 15/990,601; filed May 26, 2018; entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS; and issued as U.S. Pat. No. 10,440,166 on Oct. 8, 2019.
The entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 15/673,896; filed Aug. 10, 2017; entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS; and issued as U.S. Pat. No. 10,440,165 on Oct. 8, 2019.
The entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 14/671,677; filed Mar. 27, 2015; entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS; and issued as U.S. Pat. No. 9,172,920 on Oct. 27, 2015.
The entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 14/588,881; filed Jan. 2, 2015; entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS; and issued as U.S. Pat. No. 9,736,284 on Aug. 15, 2017.
The entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 14/474,210; filed Sep. 1, 2014; entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS; and issued as U.S. Pat. No. 8,953,040 on Feb. 10, 2015.
The entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 14/474,209; filed Sep. 1, 2014; entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS; and issued as U.S. Pat. No. 8,937,659 on Jan. 20, 2015.
The entire contents of the following application are incorporated by reference herein: U.S. patent application Ser. No. 14/099,888; filed Dec. 6, 2013; entitled DOORBELL COMMUNICATION AND ELECTRICAL SYSTEMS; and issued as U.S. Pat. No. 8,823,795 on Sep. 2, 2014.
The entire contents of the following application are incorporated by reference herein: U.S. Patent Application No. 61/872,439; filed Aug. 30, 2013; entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS.
The entire contents of the following application are incorporated by reference herein: U.S. Patent Application No. 61/859,070; filed Jul. 26, 2013; entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS.
BACKGROUNDFieldVarious embodiments disclosed herein relate to doorbell systems. Certain embodiments relate to doorbell electrical systems.
Description of Related ArtBuildings often have doorbells located at points of entry so visitors can alert occupants of the building of the visitor's arrival. The doorbells typically have chimes inside the building that emit a notification sound in response to a visitor pressing a doorbell button. Oftentimes, the chimes are available as analog chimes and digital chimes.
Analog chimes typically include two flat metal bar resonators, which are struck by plungers operated by two solenoids. Analog chimes typically require electricity for a short duration of time to produce the notable “ding-dong” sound, which is the result of the plungers striking the metal bars.
Digital chimes often employ a circuit board containing music data and a speaker. As such, digital chimes can be capable of playing a wider variety of sounds over the typical “ding-dong” sound. To achieve this, the digital chimes may require electricity over a longer period of time than their analog predecessors.
However, the notification sound emitted by analog and digital chimes can typically only be heard within a short distance from the chime itself. For example, a homeowner located remotely from her home likely would not be able to hear the notification sound, and thus, would not be aware that a visitor is ringing her doorbell. Thus, there is a need for devices and methods that are compatible with analog and digital chimes to alert remotely located individuals that a visitor seeks the attention of the building occupant.
SUMMARYThe disclosure includes embodiments that include a doorbell system that comprise an electronic doorbell comprising a camera and a button, wherein the camera is configurable to visually detect a visitor and the button is configurable to enable the visitor to sound an electronic chime, an electronic switch assembly electrically coupled to the electronic doorbell and a transformer, and an electronic chime electrically coupled to the electronic switch assembly, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell. The electronic switch assembly may define a first state and a second state. The first state may occur in response to a first electricity that is less than a first threshold, and the second state may occur in response to a second electricity that is greater than the first threshold. In the first state the electronic switch assembly may block the first electricity from passing through the electronic chime so that the electronic chime does not emit a notification sound. In the second state the electronic switch assembly may allow the second electricity to pass through the electronic chime so that the electronic chime emits the notification sound.
In several embodiments, the electronic chime may comprise a digital chime having a first printed circuit board configured to enable the electronic chime to emit the notification sound from the speaker based on digital music data. The electronic doorbell may also comprise a second printed circuit board configured to block the second electricity from entering the second printed circuit board of the electronic doorbell in response to the visitor pressing the button.
In the first state, the electronic switch assembly may allow the first electricity to pass through the electronic switch assembly. In several embodiments, the electronic switch assembly may be mechanically coupled to the electronic chime. Some embodiments of the doorbell system may comprise a plastic housing. The electronic chime and the electronic switch assembly may be located inside the plastic housing. The electronic doorbell may be located outside of the plastic housing and in a remote location relative to the plastic housing.
Several embodiments of the doorbell system may further include a remote computing device configured to receive a predetermined amount of time from a user. The predetermined amount of time may define an amount of time that the second electricity is maintained above the first threshold.
In some embodiments, the electronic switch assembly may comprise a first electronic switch and a second electronic switch that is electrically coupled to the first electronic switch. In response to the first electricity: 1) the first electronic switch may allow the first electricity to flow through the electronic switch assembly and may not allow the first electricity to flow to the electronic chime, and 2) the second electronic switch may not allow the first electricity to flow to the electronic chime. In response to the second electricity, the first and second electronic switches may allow the second electricity to flow through the electronic chime. In several embodiments, the first electronic switch may comprise a double pole, single throw switch, and the second electronic switch may comprise a single pole, single throw switch.
In some embodiments, when the first electronic switch is in a first position, the first electronic switch may electrically connect the transformer and the electronic doorbell, and when the first electronic switch is in a second position, the first electronic switch may electrically connect the transformer and the electronic chime. As well, when the second electronic switch is in an open position, the second electronic switch may electrically disconnect the electronic doorbell and the electronic chime, and when the second electronic switch is in a closed position, the second electronic switch may electrically connect the electronic doorbell and the electronic chime. In some embodiments, when the first electronic switch is in the first position, the second electronic switch is in the open position, and when the first electronic switch is in the second position, the second electronic switch is in the closed position.
In several embodiments, when the first electronic switch is in a first position, the first electronic switch may electrically connect the transformer and the electronic doorbell, and when the first electronic switch is in a second position, the first electronic switch electrically connects the electronic chime and the electronic doorbell. As well, when the second electronic switch is in an open position, the second electronic switch electrically disconnects the transformer and the electronic chime, and when the second electronic switch is in a closed position, the second electronic switch electrically connects the transformer and the electronic chime. In some embodiments, when the first electronic switch is in the first position, the second electronic switch is in the open position. Furthermore, when the first electronic switch is in the second position, the second electronic switch may be in the closed position.
In some embodiments, the electronic switch assembly comprises a first electronic switch, a second electronic switch electrically connected to the first electronic switch, and a third electronic switch electrically connected to the first and second electronic switches, wherein in response to the first electricity: 1) the first electronic switch allows the first electricity to flow through the electronic switch assembly and does not allow the first electricity to flow to the electronic chime, and 2) the second and third electronic switches do not allow the first electricity to flow to the electronic chime. As well, in response to the second electricity: 1) the first electronic switch does not allow the second electricity to flow through the electronic switch assembly, and 2) the second and third electronic switches allow the second electricity to flow to the electronic chime. In several embodiments, the first electronic switch comprises a first single pole, single throw switch, the second electronic switch comprises a second single pole, single throw switch, and the third electronic switch comprises a third single pole, single throw switch.
In some embodiments, when the first electronic switch is in a closed position, the first electronic switch electrically connects the transformer and the electronic doorbell, and when the first electronic switch is in an open position, the first electronic switch electrically disconnects the transformer and the electronic doorbell. When the second electronic switch is in a closed position, the second electronic switch electrically connects the transformer and the electronic chime, and when the second electronic switch is in an open position, the second electronic switch electrically disconnects the transformer and the electronic chime. Accordingly, when the third electronic switch is in a closed position, the third electronic switch electrically connects the electronic doorbell and the electronic chime, and when the third electronic switch is in an open position, the third electronic switch electrically disconnects the electronic doorbell and the electronic chime.
Furthermore, in several embodiments of the doorbell system, when the first electronic switch is in the closed position, the second and third electronic switches are each in the open position. As well, when the first electronic switch is in the open position, the second and third electronic switches are each in the closed position.
Some embodiments include a doorbell system that includes an electronic doorbell comprising a camera and a button, wherein the camera is configurable to visually detect a visitor and the button is configurable to enable the visitor to sound an electronic chime, a printed circuit board electrically coupled to the electronic doorbell and a transformer, and an electronic chime electrically coupled to the printed circuit board and mechanically coupled to the printed circuit board. The electronic chime may comprise a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell. The printed circuit board may be configured to block a first electricity that is less than a first threshold from entering the electronic chime. The first electricity does not cause the electronic chime to emit the notification sound. As well, the printed circuit board may be configured to allow the first electricity to pass through the printed circuit board.
In some embodiments, the printed circuit board is configured to allow a second electricity that is greater than the first threshold to enter the electronic chime. The second electricity may cause the electronic chime to emit the notification sound.
In several embodiments the printed circuit board comprises a base portion that defines a length that extends along a first direction and a width that extends along a second direction that is opposite the first direction. In some embodiments the length may be greater than the width. The printed circuit board may further comprise three tabs that extend from the length along the second direction. In some embodiments, each of the three tabs includes an aperture that extends through each of the three tabs along a third direction that is opposite the first direction and the second direction. In several embodiments, each of the apertures is configured to receive a threaded fastener, and wherein the printed circuit board is mechanically coupled to the electronic chime via three threaded fasteners.
In some embodiments, the printed circuit board is a first printed circuit board. The electronic doorbell may comprise a second printed circuit board configured to block the second electricity from entering the second printed circuit board of the electronic doorbell in response to the visitor pressing the button.
Furthermore, some embodiments include a method for using a doorbell system, wherein the doorbell system comprises an electronic doorbell, an electronic chime, and a remote computing device. The method may include obtaining the electronic doorbell that comprises a camera and a button, wherein the button is configurable to enable a visitor to sound an electronic chime, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell, electrically coupling an electronic switch assembly to the electronic chime; electrically coupling the electronic doorbell to the electronic switch assembly, configuring the electronic switch assembly so that a first electricity that is less than a first threshold passes through the electronic switch assembly without entering the electronic chime, wherein the first electricity does not cause the electronic chime to emit the notification sound, wherein the electronic switch assembly blocks the first electricity from passing through the electronic chime in response to the first electricity being less than the first threshold. Several embodiments include configuring the electronic switch assembly so that the electronic switch assembly causes a second electricity that is greater than the first threshold to pass through the electronic chime to cause the electronic chime to emit the notification sound, wherein the electronic switch assembly causes the second electricity to pass through the electronic chime in response to the second electricity being greater than the first threshold.
In several embodiments, the method may further include mechanically coupling the electronic switch assembly to the electronic chime. As well, some embodiments may include configuring an electrical circuit so that a third electricity passes from a transformer to the electronic doorbell to the electronic switch assembly and then back to the transformer without entering the electronic chime in response to the third electricity being less than first threshold. Some embodiments may also include configuring the electrical circuit so that a fourth electricity passes from the transformer to the electronic doorbell and to the electronic switch assembly. The fourth electricity may be diverted from the electronic switch assembly into the electronic chime and then back into the electronic switch assembly in response to the fourth electricity being greater than the first threshold. The electronic doorbell and the electronic switch assembly may be in series in the electrical circuit.
In many embodiments, the electronic chime comprises a digital chime having a first printed circuit board, and the method may further include configuring the first printed circuit board to enable the electronic chime to emit the notification sound from the speaker based on digital music data. In several embodiments, the electronic doorbell comprises a second printed circuit board, and the method may further include routing at least a portion of the first electricity through the second printed circuit board of the electronic doorbell. The method may further include blocking the second electricity from entering the second printed circuit board of the electronic doorbell in response to the visitor pressing the button. As well, the method may include causing the second electricity to be greater than the first threshold in response to the visitor pressing the button of the electronic doorbell.
In several embodiments the doorbell system comprises a plastic housing. The method may further include placing the electronic chime and the electronic switch assembly inside the plastic housing. As well, the method may include placing the electronic doorbell outside of the plastic housing and in a remote location relative to the plastic housing.
Several embodiments may further include using the electronic switch assembly to block transformer electrical power from entering the electronic chime while the first electricity is less than the first threshold. As well, the method may include using the electronic switch assembly to divert the transformer electrical power from the electronic switch assembly into the electronic chime while the second electricity is greater than the first threshold.
In some embodiments, the first threshold is a first electrical power threshold. In several embodiments the first threshold is a first electrical voltage threshold. In some embodiments the first threshold is a first electrical current threshold.
In several embodiments, the method may further include setting a predetermined amount of time via the remote computing device prior to the second electricity exceeding the first threshold. The method may include sending the predetermined amount of time wirelessly from the remote computing device to the electronic doorbell. Once the second electricity is greater than the first threshold, the method may further include maintaining the second electricity above the first threshold for the predetermined amount of time.
Some embodiments include another method for using a doorbell system, wherein the doorbell system comprises an electronic doorbell, an electronic chime, and a remote computing device. The method may include obtaining the electronic doorbell that comprises a camera and a button, wherein the button is configurable to enable a visitor to sound an electronic chime, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell. The method may include mechanically coupling a printed circuit board to the electronic chime and electrically coupling the printed circuit board to the electronic chime. As well, the method may include electrically coupling the electronic doorbell to the printed circuit board and configuring the printed circuit board so that the printed circuit board allows a first electricity to pass through the printed circuit board in response to the first electricity being less than the threshold. The method may also include configuring the printed circuit board so that the printed circuit board blocks the first electricity from entering the electronic chime in response to the first electricity being less than the first threshold, wherein the first electricity does not cause the electronic chime to emit the notification sound.
In several embodiments, the printed circuit board may be a first printed circuit board, and the electronic doorbell may comprise a second printed circuit board. The method may further include routing at least a portion of the first electricity through the second printed circuit board of the electronic doorbell. The method may also include configuring the second printed circuit board to block the second electricity from entering the second printed circuit board of the electronic doorbell in response to the visitor pressing the button.
In some embodiments, the method may further include configuring the printed circuit board so that the printed circuit board causes a second electricity that is greater than the first threshold to enter the electronic chime to cause the electronic chime to emit the notification sound. The printed circuit board may cause the second electricity to pass through the electronic chime in response to the second electricity being greater than the first threshold.
Several embodiments may further include using the remote computing device to set a predetermined amount of time for the second electricity to stay above the first threshold. As well, the methods may include wirelessly sending the predetermined amount from the remote computing device to the electronic doorbell. In response to the second electricity being greater than the first threshold, the method may include using the electronic doorbell to maintain the second electricity above the first threshold for the predetermined amount of time.
In some embodiments, the doorbell system may include a plastic housing, and the electronic chime and the electronic switch assembly may be located inside the plastic housing and the electronic doorbell may be located outside of the plastic housing and in a remote location relative to the plastic housing.
Some embodiments include using a doorbell system. The doorbell system may comprise an electronic doorbell, an electronic chime, and a remote computing device. The method may include obtaining the electronic doorbell that comprises a camera and a button. The button may be configurable to enable a visitor to sound an electronic chime, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell. The method may include mechanically coupling a printed circuit board to the electronic chime and electrically coupling the printed circuit board to the electronic chime. As well, the method may include electrically coupling the electronic doorbell to the printed circuit board. The method may also include configuring the electronic switch assembly so that the electronic switch assembly causes a second electricity that is greater than the first threshold to pass through the electronic chime to cause the electronic chime to emit the notification sound. The electronic switch assembly may cause the second electricity to pass through the electronic chime in response to the second electricity being greater than the first threshold.
In several embodiments, the printed circuit board is a first printed circuit board, and the electronic doorbell comprises a second printed circuit board. The method may further include routing at least a portion of the first electricity through the second printed circuit board of the electronic doorbell. The method may also include configuring the second printed circuit board to block the second electricity from entering the second printed circuit board of the electronic doorbell in response to the visitor pressing the button.
Many embodiments may further include maintaining the second electricity above the first threshold for a predetermined amount of time. In several embodiments, the method may include setting the predetermined amount of time via the remote computing device prior to the second electricity exceeding the first threshold, and sending the predetermined amount of time wirelessly from the remote computing device to the electronic doorbell.
BRIEF DESCRIPTION OF THE DRAWINGSThese and other features, aspects, and advantages are described below with reference to the drawings, which are intended to illustrate, but not to limit, the invention. In the drawings, like reference characters denote corresponding features consistently throughout similar embodiments.
FIG. 1 illustrates a front view of a communication system, according to some embodiments.
FIG. 2 illustrates a computing device running software, according to some embodiments.
FIG. 3 illustrates an embodiment in which a security system is connected to a building, according to some embodiments.
FIG. 4 illustrates a schematic view of a doorbell system, according to some embodiments.
FIG. 5 illustrates a schematic view of the doorbell system fromFIG. 4 with a switch assembly in a first state, according to some embodiments.
FIG. 6 illustrates a schematic view of the doorbell system fromFIG. 4 with the switch assembly in a second state, according to some embodiments.
FIG. 7 illustrates a schematic view of a doorbell system, according to some embodiments.
FIG. 8 illustrates a schematic view of the switch assembly fromFIG. 7 with the switch assembly in a first state, according to some embodiments.
FIG. 9 illustrates a schematic view of the switch assembly fromFIG. 7 with the switch assembly in a second state, according to some embodiments.
FIG. 10 illustrates a schematic view of a doorbell system, according to some embodiments.
FIG. 11 illustrates a schematic view of the switch assembly fromFIG. 10 with the switch assembly in a first state, according to some embodiments.
FIG. 12 illustrates a schematic view of the switch assembly fromFIG. 10 with the switch assembly in a second state, according to some embodiments.
FIG. 13 illustrates an electronic switch assembly, according to some embodiments.
FIGS. 14-16 illustrate flow-charts of various methods of using a doorbell system, according to some embodiments.
DETAILED DESCRIPTIONAlthough certain embodiments and examples are disclosed below, inventive subject matter extends beyond the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof. Thus, the scope of the claims appended hereto is not limited by any of the particular embodiments described below. For example, in any method or process disclosed herein, the acts or operations of the method or process may be performed in any suitable sequence and are not necessarily limited to any particular disclosed sequence. Various operations may be described as multiple discrete operations in turn, in a manner that may be helpful in understanding certain embodiments; however, the order of description should not be construed to imply that these operations are order dependent. Additionally, the structures, systems, and/or devices described herein may be embodied as integrated components or as separate components.
For purposes of comparing various embodiments, certain aspects and advantages of these embodiments are described. Not necessarily all such aspects or advantages are achieved by any particular embodiment. Thus, for example, various embodiments may be carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other aspects or advantages as may also be taught or suggested herein.
Buildings often have doorbell buttons located at points of entry. The doorbell buttons may be electrically connected to a chime located inside the building. Accordingly, when a visitor presses the doorbell button, this may cause a notification sound to be emitted from the chime to thereby alert the building occupants of the visitor's arrival. It should be appreciated that the chime may be available as an analog chime or digital chime.
Digital chimes may include a circuit board containing music data and a speaker configured to play a song. Digital chimes may require electricity over a longer period of time than analog chimes. Accordingly, digital chimes may require additional electrical components that may not be available in an analog chime system. As such, various embodiments described herein provide methods of use and systems of electronic doorbells and digital doorbell chimes.
Doorbell System EmbodimentsCommunication systems can provide a secure and convenient way for a remotely located individual to communicate with a person who is approaching a sensor, such as a proximity sensor or motion sensor, or with a person who rings a doorbell, which can be located in a doorway, near an entrance, or within 15 feet of a door. Some communication systems allow an individual to hear, see, and talk with visitors who approach at least a portion of the communication system and/or press a button, such as a doorbell's button. For example, communication systems can use a computing device to enable a remotely located person to see, hear, and/or talk with visitors. Computing devices can include computers, laptops, tablets, mobile devices, smartphones, cellular phones, and wireless devices (e.g., cars with wireless communication). Example computing devices include the iPhone, iPad, iMac, MacBook Air, and MacBook Pro made by Apple Inc. Communication between a remotely located person and a visitor can occur via the Internet, cellular networks, telecommunication networks, and wireless networks.
FIG. 1 illustrates a front view of a communication system embodiment. Thecommunication system200 can include a security system202 (e.g., a doorbell) and acomputing device204. Although the illustratedsecurity system202 includes many components in one housing, several security system embodiments include components in separate housings. Thesecurity system202 can include acamera assembly208 and adoorbell button212. Thecamera assembly208 can be a video camera, which in some embodiments is a webcam. Thesecurity system202 can include adiagnostic light216 and apower indicator light220. In some embodiments, thediagnostic light216 is a first color (e.g., blue) if thesecurity system202 and/or thecommunication system200 is connected to a wireless Internet network and is a second color (e.g., red) if thesecurity system202 and/or thecommunication system200 is not connected to a wireless Internet network. In some embodiments, thepower indicator220 is a first color if thesecurity system202 is connected to a power source. The power source can be power supplied by the building to which thesecurity system202 is attached. In some embodiments, thepower indicator220 is a second color or does not emit light if thesecurity system202 is not connected to the power source.
The security system202 (e.g., a doorbell) can include an outer housing224, which can be water resistant and/or waterproof. The outer housing can be made from metal or plastic, such as molded plastic with a hardness of 60 Shore D. In some embodiments, the outer housing224 is made from brushed nickel or aluminum.
Rubber seals can be used to make the outer housing224 water resistant or waterproof. Thesecurity system202 can be electrically coupled to a power source, such as wires electrically connected to a building's electrical power system. In some embodiments, thesecurity system202 includes a battery for backup and/or primary power.
Wireless communication230 can enable the security system202 (e.g., a doorbell) to communicate with thecomputing device204. Some embodiments enable communication via cellular and/or WiFi networks. Some embodiments enable communication via the Internet. Several embodiments enable wired communication between thesecurity system202 and thecomputing device204. Thewireless communication230 can include the following communication means: radio, WiFi (e.g., wireless local area network), cellular, Internet, Bluetooth, telecommunication, electromagnetic, infrared, light, sonic, and microwave. Other communication means are used by some embodiments. In some embodiments, such as embodiments that include telecommunication or cellular communication means, thesecurity system202 can initiate voice calls or send text messages to a computing device204 (e.g., a smartphone, a desktop computer, a tablet computer, a laptop computer).
Some embodiments include computer software (e.g., application software), which can be a mobile application designed to run on smartphones, tablet computers, and other mobile devices. Software of this nature is sometimes referred to as “app” software. Some embodiments include software designed to run on desktop computers and laptop computers.
Thecomputing device204 can run software with a graphical user interface. The user interface can include icons or buttons. In some embodiments, the software is configured for use with a touch-screen computing device such as a smartphone or tablet.
FIG. 2 illustrates acomputing device204 running software. The software includes a user interface240 displayed on adisplay screen242. The user interface240 can include asecurity system indicator244, which can indicate the location of the security system that the user interface is displaying. For example, a person can use onecomputing device204 to control and/or interact with multiple security systems, such as one security system located at a front door and another security system located at a back door. Selecting thesecurity system indicator244 can allow the user to choose another security system (e.g., the back door security system rather than the front door security system).
The user interface240 can include aconnectivity indicator248. In some embodiments, the connectivity indicator can indicate whether the computing device is in communication with a security system, the Internet, and/or a cellular network. Theconnectivity indicator248 can alert the user if thecomputing device204 has lost its connection with thesecurity system202; thesecurity system202 has been damaged; thesecurity system202 has been stolen; thesecurity system202 has been removed from its mounting location; thesecurity system202 lost electrical power; and/or if thecomputing device204 cannot communicate with thesecurity system202. In some embodiments, theconnectivity indicator248 alerts the user of thecomputing device204 by flashing, emitting a sound, displaying a message, and/or displaying a symbol.
In some embodiments, if thesecurity system202 loses power, loses connectivity to thecomputing device204, loses connectivity to the Internet, and/or loses connectivity to a remote server, aremote server206 sends an alert (e.g., phone call, text message, image on the user interface240) regarding the power and/or connectivity issue. In several embodiments, theremote server206 can manage communication between thesecurity system202 and the computing device. In some embodiments, information from thesecurity system202 is stored by theremote server206. In several embodiments, information from thesecurity system202 is stored by theremote server206 until the information can be sent to thecomputing device204, uploaded to thecomputing device204, and/or displayed to the remotely located person via thecomputing device204. Theremote server206 can be a computing device that stores information from thesecurity system202 and/or from thecomputing device204. In some embodiments, theremote server206 is located in a data center.
In some embodiments, thecomputing device204 and/or theremote server206 attempts to communicate with thesecurity system202. If thecomputing device204 and/or theremote server206 is unable to communicate with thesecurity system202, thecomputing device204 and/or theremote server206 alerts the remotely located person via the software, phone, text, a displayed message, and/or a website. In some embodiments, thecomputing device204 and/or theremote server206 attempts to communicate with thesecurity system202 periodically; at least every five hours and/or less than every 10 minutes; at least every 24 hours and/or less than every 60 minutes; or at least every hour and/or less than every second.
In some embodiments, theserver206 can initiate communication to thecomputer device204 and/or to thesecurity system202. In several embodiments, theserver206 can initiate, control, and/or block communication between thecomputing device204 and thesecurity system202.
In several embodiments, a user can log into an “app,” website, and/or software on a computing device (e.g., mobile computing device, smartphone, tablet, desktop computer) to adjust the security system settings discussed herein.
In some embodiments, a computing device can enable a user to watch live video and/or hear live audio from a security system due to the user's request rather than due to actions of a visitor. Some embodiments include a computing device initiating a live video feed (or a video feed that is less than five minutes old).
In some embodiments, the user interface240 displays animage252 such as a still image or a video of an area near and/or in front of thesecurity system202. Theimage252 can be taken by thecamera assembly208 and stored by thesecurity system202,server206, and/orcomputing device204. The user interface240 can include arecording button256 to enable a user to record images, videos, and/or sound from thecamera assembly208, microphone of thesecurity system202, and/or microphone of thecomputing device204.
In several embodiments, the user interface240 includes apicture button260 to allow the user to take still pictures and/or videos of the area near and/or in front of thesecurity system202. The user interface240 can also include a sound adjustment button264 and amute button268. The user interface240 can include camera manipulation buttons such as zoom, pan, and light adjustment buttons. In some embodiments, thecamera assembly208 automatically adjusts between Day Mode and Night Mode. Some embodiments include an infrared camera and/or infrared lights to illuminate an area near thesecurity system202 to enable thecamera assembly208 to provide sufficient visibility (even at night).
In some embodiments, buttons include diverse means of selecting various options, features, and functions. Buttons can be selected by mouse clicks, keyboard commands, and touching a touch screen. Many embodiments include buttons that can be selected without touch screens.
In some embodiments, the user interface240 includes a quality selection button, which can allow a user to select the quality and/or amount of the data transmitted from thesecurity system202 to thecomputing device204 and/or from thecomputing device204 to thesecurity system202.
In some embodiments, video can be sent to and/or received from thecomputing device204 using video chat protocols such as FaceTime (by Apple Inc.) or Skype (by Microsoft Corporation). In some embodiments, these videos are played by videoconferencing apps on thecomputing device204 instead of being played by the user interface240.
The user interface240 can include atermination button276 to end communication between thesecurity system202 and thecomputing device204. In some embodiments, thetermination button276 ends the ability of the person located near the security system202 (i.e., the visitor) to hear and/or see the user of thecomputing device204, but does not end the ability of the user of thecomputing device204 to hear and/or see the person located near thesecurity system202.
In some embodiments, abutton276 is both an answer button (to accept a communication request from a visitor) and is a termination button (to end communication between thesecurity system202 and the computing device204). Thebutton276 can include the word “Answer” when the system is attempting to establish two-way communication between the visitor and the user. Selecting thebutton276 when the system is attempting to establish two-way communication between the visitor and the user can start two-way communication. Thebutton276 can include the words “End Call” during two-way communication between the visitor and the user. Selecting thebutton276 during two-way communication between the visitor and the user can terminate two-way communication. In some embodiments, terminating two-way communication still enables the user to see and hear the visitor. In some embodiments, terminating two-way communication causes thecomputing device204 to stop showing video from the security system and to stop emitting sounds recorded by the security system.
In some embodiments, the user interface240 opens as soon as the security system detects a visitor (e.g., senses indications of a visitor). Once the user interface240 opens, the user can see and/or hear the visitor even before “answering” or otherwise accepting two-way communication, in several embodiments.
Some method embodiments include detecting a visitor with a security system. The methods can include causing the user interface to display on aremote computing device204 due to the detection of the visitor (e.g., with or without user interaction). The methods can include displaying video from the security system and/or audio from the security system before the user accepts two-way communication with the visitor. The methods can include displaying video from the security system and/or audio from the security system before the user accepts the visitor's communication request. The methods can include the computing device simultaneously asking the user if the user wants to accept (e.g., answer) the communication request and displaying audio and/or video of the visitor. For example, in some embodiments, the user can see and hear the visitor via the security system before opening a means of two-way communication with the visitor.
In some embodiments, the software includes means to start the video feed on demand. For example, a user of the computing device might wonder what is happening near thesecurity system202. The user can open the software application on thecomputing device204 and instruct the application to show live video and/or audio from thesecurity device202 even if no event near thesecurity system202 has triggered the communication.
In several embodiments, thesecurity device202 can be configured to record when thesecurity device202 detects movement and/or the presence of a person. The user of thecomputing device204 can later review all video and/or audio records when thesecurity device202 detected movement and/or the presence of a person.
Referring now toFIG. 1, in some embodiments, theserver206 controls communication between thecomputing device204 and thesecurity system202, which can be a doorbell with a camera, a microphone, and a speaker. In several embodiments, theserver206 does not control communication between thecomputing device204 and thesecurity system202.
In some embodiments, data captured by the security system and/or the computing device204 (such as videos, pictures, and audio) is stored by another remote device such as theserver206. Cloud storage, enterprise storage, and/or networked enterprise storage can be used to store video, pictures, and/or audio from thecommunication system200 or from any part of thecommunication system200. The user can download and/or stream stored data and/or storage video, pictures, and/or audio. For example, a user can record visitors for a year and then later can review conversations with visitors from the last year. In some embodiments, remote storage, theserver206, thecomputing device204, and/or thesecurity system202 can store information and statistics regarding visitors and usage.
FIG. 3 illustrates an embodiment in which asecurity system202 is connected to abuilding300, which can include anentryway310 that has adoor254. Adoor lock250 can be configured to lock and unlock thedoor254.Electrical wires304 can electrically couple thesecurity system202 to the electrical system of thebuilding300 so that thesecurity system202 can receive electrical power from thebuilding300.
Awireless network308 can allow devices to wirelessly access the Internet. Thesecurity system202 can access the Internet via thewireless network308. Thewireless network308 can transmit data from thesecurity system202 to the Internet, which can transmit the data to remotely located computingdevices204. The Internet and wireless networks can transmit data from remotely located computingdevices204 to thesecurity system202. In some embodiments, asecurity system202 connects to a home's WiFi.
As illustrated inFIG. 3, one computing device204 (e.g., a laptop, a smartphone, a mobile computing device, a television) can communicate withmultiple security systems202. In some embodiments,multiple computing devices204 can communicate with onesecurity system202. In some embodiments, thesecurity system202 can communicate (e.g., wirelessly230) with atelevision306, which can be a smart television. Users can view thetelevision306 to see a visitor and/or talk with the visitor.
FIGS. 4-12 illustrate several embodiments of doorbell systems that include electronic switch assemblies for blocking and/or allowing electricity to enter an electronic chime412 (e.g. a digital chime). In the example shown inFIG. 4, thedoorbell system400 includes a security system202 (e.g. electronic doorbell) that comprises a camera and a button. The camera may be configurable to visually detect a visitor. As well, the button may be configurable to enable the visitor to sound anelectronic chime412. In this manner, theelectronic chime412 may comprise a speaker configurable to emit anotification sound430 in response to the visitor pressing the button of thesecurity system202
Thedoorbell system400 may also include anelectronic switch assembly410 electrically coupled to thesecurity system202 and atransformer424. As well, theelectronic chime412 may be electrically coupled to theelectronic switch assembly410. In many embodiments, theelectronic chime412 may also be mechanically coupled to theelectronic switch assembly410.
It should be appreciated that theelectronic switch assembly410 also may be referred to as a printed circuit board. The printed circuit board may be configured to enable theelectronic chime412 to emit thenotification sound430 from the speaker based on digital music data.
With reference toFIGS. 5-6, 8-9 and 11-12 theelectronic switch assembly410 may define a first state and a second state. The first state may occur in response to afirst electricity450 that is less than a first threshold. In the first state theelectronic switch assembly410 may block thefirst electricity450 from passing through theelectronic chime412 so theelectronic chime412 does not emit thenotification sound430. Stated differently, the printed circuit board may be configured to block thefirst electricity450 that is less than the first threshold from entering theelectronic chime412. In this regard, theelectronic switch assembly410 may allow thefirst electricity450 to pass through theelectronic switch assembly410 from thesecurity system202 through theelectronic switch assembly410 to thetransformer424, without entering theelectronic chime412. It should be appreciated that the first threshold may be the amount of electricity required to activate theelectronic chime412 to emit thenotification sound430.
Furthermore, the second state may occur in response to asecond electricity452 that is greater than the first threshold. In the second state theelectronic switch assembly410 may allow thesecond electricity452 to pass through theelectronic chime412 so that theelectronic chime412 emits thenotification sound430. In other words, theelectronic switch assembly410, or printed circuit board, may be configured to allow thesecond electricity452 that is greater than the first threshold to enter theelectronic chime412. Thesecond electricity452 may cause theelectronic chime412 to emit thenotification sound430.
Referring now toFIG. 5, theswitch assembly410 can be placed inside of a housing415, which can also contain theelectronic chime412. Theswitch assembly410 and theelectronic chime412 can be mechanically coupled to the housing415. The housing415 can be a plastic housing with a hollow internal portion that contains theelectronic chime412 and theswitch assembly410. At least one screw can mechanically couple the switch assembly inside of the housing415.
The electronic doorbell (e.g., the security system202) can be located outside of the housing415. In some embodiments, the electronic doorbell is placed outside of a building300 (shown inFIG. 3) while the housing415 is placed inside of thebuilding300. The electronic doorbell and the housing415 can be coupled to walls of thebuilding300. The electronic doorbell can be in a remote location relative to the housing415 (e.g., the doorbell is located outside while the plastic housing415 is located inside of the building). The doorbell, theelectronic chime412, and theswitch assembly410 can all be configured to be electrically coupled to the samebuilding power supply420 even when the doorbell is located in the remote location relative to the housing415.
Some embodiments may implement switches to execute routing thefirst electricity450 andsecond electricity452. For example, as illustrated inFIGS. 7-9, theelectronic switch assembly410 may comprise a firstelectronic switch414aand a secondelectronic switch416athat is electrically coupled to the firstelectronic switch414a. The first andsecond switches414aand416amay perform different functions in response to receiving thefirst electricity450aor thesecond electricity452a. For example, and as illustrated inFIG. 8, in response to thefirst electricity450a, the firstelectronic switch414amay allow thefirst electricity450ato flow through theelectronic switch assembly410aand may not allow thefirst electricity450ato flow through theelectronic chime412. As well, in response to thefirst electricity450a, the secondelectronic switch416adoes not allow thefirst electricity450ato flow through theelectronic chime412. Furthermore, as illustrated inFIG. 9, in response to thesecond electricity452a, the first and secondelectronic switches414aand416aallow thesecond electricity452ato flow through theelectronic chime412.
As further illustrated inFIGS. 8-9, the first andsecond switches414aand416amay be configured to implement different operations based on their respective positions. For example, as illustrated inFIG. 8, when the firstelectronic switch414ais in a first position, the firstelectronic switch414amay electrically connect thetransformer424 and thesecurity system202. Likewise, as illustrated inFIG. 9, when the firstelectronic switch414ais in a second position, the firstelectronic switch414amay electrically connect thetransformer424 and theelectronic chime412.
In some embodiments, the locations of the first andsecond switches414aand416amay be reversed, as such, when the firstelectronic switch414ais in the second position, the firstelectronic switch414amay electrically connect theelectronic chime412 and thesecurity system202. However, it should be appreciated that even in a reverse configuration, the first andsecond switches414aand416amay effectively achieve the same objective as that illustrated and described with respect toFIGS. 8 and 9.
With reference toFIG. 8, when the secondelectronic switch416ais in an open position, the secondelectronic switch416amay electrically disconnect thesecurity system202 and theelectronic chime412. When the secondelectronic switch416ais in the open position, the secondelectronic switch416adoes not allow thefirst electricity450ato flow to theelectronic chime412. As shown inFIG. 9, when the secondelectronic switch416ais in a closed position, the secondelectronic switch416amay electrically connect thesecurity system202 and theelectronic chime412. In this position, the secondelectronic switch416amay allow thefirst electricity450ato flow to theelectronic chime412. As well, in some embodiments, when the secondelectronic switch416ais in the open position, the secondelectronic switch416amay electrically disconnect thetransformer424 and theelectronic chime412. Accordingly, when the secondelectronic switch416ais in the closed position, the secondelectronic switch416amay electrically connect thetransformer424 and theelectronic chime412.
The position of the first andsecond switches414aand416a, may be dependent on the position of the other switch. For example, as shown inFIG. 8, when the firstelectronic switch414ais in the first position, the secondelectronic switch416amay be in the open position. Furthermore, as illustrated inFIG. 9, when the firstelectronic switch414ais in the second position, the secondelectronic switch416amay be in the closed position.
While some embodiments may implement two electronic switches, it should be appreciated that any number of electronic switches less than or greater than two may be implemented. For example, as illustrated inFIGS. 10-12, theelectronic switch assembly410bmay comprise a firstelectronic switch414b, a secondelectronic switch416belectrically connected to the firstelectronic switch414b, and a thirdelectronic switch418belectrically connected to the first and secondelectronic switches414band416b.
Similar to the two-switch embodiment, the first, second andthird switches414b,416band418bmay move to various positions in response to receiving thefirst electricity450bor thesecond electricity452b. For example, with reference toFIG. 11, in response to thefirst electricity450b, the firstelectronic switch414bmay allow thefirst electricity450bto flow through theelectronic switch assembly410band may not allow thefirst electricity450bto flow to theelectronic chime412. As well, the second and thirdelectronic switches416band418bmay not allow thefirst electricity450bto flow to theelectronic chime412. With reference toFIG. 12, in response to thesecond electricity452b, the firstelectronic switch414bmay not allow thesecond electricity452bto flow through theelectronic switch assembly410b, and the second and thirdelectronic switches416band418bmay allow thesecond electricity452bto flow through theelectronic chime412.
Similar to the two-switch example as illustrated inFIGS. 7-9, the first, second andthird switches414b,416band418bmay be configured to implement different operations based on their respective positions. For example, as illustrated inFIG. 11, when the firstelectronic switch414bis in a closed position, the firstelectronic switch414belectrically connects thetransformer424 and thesecurity system202. Likewise, as illustrated inFIG. 12, when the firstelectronic switch414bis in an open position, the firstelectronic switch414belectrically disconnects thetransformer424 and thesecurity system202.
With continued reference toFIG. 12, when the secondelectronic switch416bis in a closed position, the secondelectronic switch416belectrically connects thetransformer424 and theelectronic chime412. Now with reference toFIG. 11, when the secondelectronic switch416bis in an open position, the secondelectronic switch416belectrically disconnects thetransformer424 and theelectronic chime412.
As illustrated inFIG. 12, when the thirdelectronic switch418bis in a closed position, the thirdelectronic switch418belectrically connects thesecurity system202 and theelectronic chime412. Furthermore, as shown inFIG. 11, when the thirdelectronic switch418bis in an open position, the thirdelectronic switch418belectrically disconnects thesecurity system202 and theelectronic chime412.
As well, the position of the first, second andthird switches414b,416band418b, may be dependent on the position of the other switch(es). For example, as shown inFIG. 11, when the firstelectronic switch414bis in the closed position, the second and thirdelectronic switches416band418bmay each be in the open position. Furthermore, as illustrated inFIG. 12, when the firstelectronic switch414bis in the open position, the second and thirdelectronic switches416band418beach may be in the closed position.
It should be appreciated that the firstelectronic switch414aand the secondelectronic switch416amay comprise any electrical component configured to route electricity or limit the amount of electricity flow, such as a resistor. For example, in some embodiments, such as the two-switch embodiment illustrated inFIGS. 7-9, the firstelectronic switch414amay comprise a double pole, single throw switch, and the secondelectronic switch416amay comprise a single pole, single throw switch. As well, in some embodiments, such as the three-switch embodiment, the first, second and thirdelectronic switches414b,416band418bmay each comprise a single pole, single throw switch.
Theelectronic switch assembly410, or the printed circuit board, may be arranged and configured in various sizes and geometries. For example, as illustrated inFIG. 13, theelectronic switch assembly410 may comprise a base portion that defines a length that extends along a first direction and a width that extends along a second direction that is opposite the first direction. In some embodiments, theelectronic switch assembly410 may define a rectangular shape, wherein the length is greater than the width. As well, in some embodiments theelectronic switch assembly410 may further include threetabs510 that may extend from the length along the second direction. As such,electronic switch assembly410 embodiments viewed from the top down may appear to have a footprint of a capital “E.” However, it should be appreciated that theelectronic switch assembly410 may be arranged and configured to define any shape.
With continued reference toFIG. 13, each of the threetabs510 may include anaperture512 that extends through each of the threetabs510 along a third direction that is opposite the first direction and the second direction. Each of theapertures512 may be configured to receive a threaded fastener. In this manner, theelectronic switch assembly410 may be mechanically coupled to theelectronic chime412 via three threaded fasteners. In other words, each of the threaded fasteners may extend through arespective aperture512 and mechanically engage theelectronic chime412 to mechanically couple theelectronic switch assembly410 to theelectronic chime412. It should be appreciated thatelectronic switch assembly410 may include any number of apertures less than or greater than three and, accordingly, may be mechanically fastened to theelectronic chime412 via any number of mechanical fasteners, such as threaded fasteners, or the like.
In some embodiments, the doorbell system comprises a housing and theelectronic chime412 and theelectronic switch assembly410 are located inside the housing. As well, thesecurity system202 may be located outside of the housing, in a remote location relative to the housing. For example thesecurity system202 may be located adjacent a doorway or an entry or point of a building, such as along an exterior wall adjacent a door. However, it should be appreciated that either or both thesecurity system202 and the housing may be located inside or outside the building. As well, in some embodiments, the housing is a plastic housing. However, it should be appreciated that the housing may comprise any type of material configured to safely house electronic components inside or outside a building.
As well, several embodiments further include aremote computing device204. The remote computing device can be configured to send and receive information to and from thesecurity system202. In several embodiments, the information may include the first threshold. For example, theremote computing device204 may be used to adjust the level of the first threshold. For example, if the user wishes to adjust the first threshold from 12 volts to 14 volts, the user may do so by using theremote computing device204. As well, theremote computing device204 may be used to change the first threshold to voltage, current, power, or the like. In this regard, theswitch assembly410 may include logic circuitry so it can be programmed according to the information as established by theremote computing device204.
As well, in several embodiments, the information may include a predetermined amount of time that the second electricity is maintained above the first threshold. In other words, the predetermined amount of time may determine the amount of time theelectronic chime412 emits thenotification sound430. For example, if thenotification sound430 is a song, the predetermined amount of time may determine the amount of time that the song plays when a visitor has pressed the button of thesecurity system202. It should be appreciated that the predetermined amount of time may be any amount of time, such as 3 seconds, 5 seconds, 10 seconds, 30 seconds, 60 seconds, or any other amount of time.
Doorbell Method EmbodimentsMany embodiments utilize the doorbell system embodiments as previously described. For example, several embodiments include a method for using a doorbell system. The doorbell system may include an electronic doorbell, an electronic chime, and a remote computing device. As illustrated inFIG. 14, the method may include obtaining the electronic doorbell (or security system202) that comprises a camera and a button (at step700). The button may be configurable to enable a visitor to sound anelectronic chime412. Theelectronic chime412 may include a speaker configurable to emit anotification sound430 in response to the visitor pressing the button of theelectronic doorbell202. The method may also include electrically coupling anelectronic switch assembly410 to the electronic chime412 (at step702). In several embodiments, the method also may include mechanically coupling theelectronic switch assembly410 to theelectronic chime412.
Furthermore, the method may include electrically coupling theelectronic doorbell202 to the electronic switch assembly410 (at step704). As well, some methods may include configuring theelectronic switch assembly410 so that afirst electricity450 that is less than a first threshold passes through theelectronic switch assembly410 without entering the electronic chime412 (at step706). In this manner, thefirst electricity450 may not cause theelectronic chime412 to emit thenotification sound430. As such, in response to the first electricity being less than the first threshold, theelectronic switch assembly410 may block thefirst electricity450 from passing through theelectronic chime412.
Some embodiments may further include configuring theelectronic switch assembly410 so that theelectronic switch assembly410 causes asecond electricity452 that is greater than the first threshold to pass through the electronic chime412 (at step708). In this manner, thesecond electricity452 may cause theelectronic chime412 to emit thenotification sound430. Theelectronic switch assembly410 may be configured to allow thesecond electricity452 to pass through theelectronic chime412 in response to thesecond electricity452 being greater than the first threshold. It should be appreciated that the first threshold may be an electricity value that is required by theelectronic chime412 in order to emit thenotification sound430.
It should be appreciated that embodiments described in this disclosure are not limited to the first andsecond electricity450 and452. For example, several embodiments may further include a third and a fourth electricity. Some embodiments include configuring an electrical circuit, such as thedoorbell system400, so that the third electricity passes from thetransformer424 to thesecurity system202, and to theelectronic switch assembly410, and then to thetransformer424 without entering theelectronic chime412 in response to the third electricity being less than first threshold. As well, several embodiments include configuring the electrical circuit so that a fourth electricity passes from thetransformer424 to thesecurity system202 and to theelectronic switch assembly410 in response to the fourth electricity being greater than the first threshold. In this manner, the fourth electricity may be diverted from theelectronic switch assembly410 into theelectronic chime412, and then back into theelectronic switch assembly410. It should be appreciated that thesecurity system202 and theelectronic switch assembly410 may be connected in series in the electrical circuit. However, it should also be appreciated that thesecurity system202 and theelectronic switch assembly410 may be connected in parallel.
Theelectronic chime412 may comprise any type of digital device configured to emit anotification sound430 in response to the visitor pressing the button of thesecurity system202. For example, theelectronic chime412 may be a digital chime having a first printed circuit board. In several embodiments, the method may further include configuring the first printed circuit board to enable theelectronic chime412 to emit thenotification sound430 from the speaker based on digital music data.
In several embodiments, when the visitor presses the button of thesecurity system202, thesecurity system202 may be configured to route all electricity to theelectronic chime412 via theelectronic switch assembly410. To accomplish this, thesecurity system202 may further comprise a second printed circuit board. In some embodiments, the method may further include routing at least a portion of thefirst electricity450 through the second printed circuit board of thesecurity system202. In response to the visitor pressing the button, the method may further include blocking thesecond electricity452 from entering the second printed circuit board of the security system. In order to cause theelectronic chime412 to emit thenotification sound430, the method may include causing thesecond electricity452 to be greater than the first threshold in response to the visitor pressing the button of thesecurity system202.
Thedoorbell system400, via theelectronic switch assembly410, also may be configured to block thefirst electricity450 from entering theelectronic chime412 when thefirst electricity450 is less than the first threshold. Specifically, in several embodiments, the method may include using theelectronic switch assembly410 to block transformer electrical power from entering theelectronic chime412 while thefirst electricity450 is less than the first threshold. As well, the method may include using theelectronic switch assembly410 to divert the transformer electrical power from theelectronic switch assembly410 into theelectronic chime412 while thesecond electricity452 is greater than the first threshold.
It should be appreciated that the first threshold may be any type of electricity, such as power, voltage, and/or current. In this regard the first threshold may be described as a first electrical power threshold, a first electrical voltage threshold, and/or a first electrical current threshold.
Thedoorbell system400 may also include theremote computing device204, which can be used to send and receive information to and/or from thesecurity system202. For example, the information may include a predetermined amount of time that defines the duration of time theelectronic chime412 emits thenotification sound430. In this regard, some embodiments may further include setting the predetermined amount of time via theremote computing device204 prior to thesecond electricity452 exceeding the first threshold. As well, the method may include sending the predetermined amount of time wirelessly from theremote computing device204 to thesecurity system202. And once thesecond electricity452 is greater than the first threshold, the method may further include maintaining thesecond electricity452 above the first threshold for the predetermined amount of time.
In some embodiments, thedoorbell system400 comprises a housing, such as a plastic housing. Accordingly, the method may further include placing theelectronic chime412 and theelectronic switch assembly410 inside the plastic housing. As well, the method may include placing thesecurity system202 outside the plastic housing and in a remote location relative to the plastic housing. Some methods may further include mounting the plastic housing along an interior surface of the building and mounting thesecurity system202 along an exterior surface of the building near an entry point of the building. However, it should be appreciated that the plastic housing and/or thesecurity system202 may be mounted anywhere along an interior or exterior surface of the building.
As illustrated inFIG. 15, some embodiments disclose another method for using thedoorbell system400. The method may include obtaining the security system202 (at step800). The method may also include mechanically coupling a printedcircuit board410 to theelectronic chime412 and electrically coupling the printedcircuit board410 to the electronic chime412 (at step802). As well, some methods include electrically coupling thesecurity system202 to the printed circuit board410 (at step804).
Several embodiments may include configuring the printedcircuit board410 so that the printedcircuit board410 allows afirst electricity450 to pass through the printedcircuit board410 in response to thefirst electricity450 being less than the first threshold (at step806). As well, the method may include configuring the printedcircuit board410 so that the printedcircuit board410 blocks thefirst electricity450 from entering theelectronic chime412 in response to thefirst electricity450 being less than the first threshold (at step808). Accordingly, thefirst electricity450 does not cause theelectronic chime412 to emit thenotification sound430.
Several embodiments may further include configuring the printedcircuit board410 so that the printedcircuit board410 causes asecond electricity452 that is greater than the first threshold to enter theelectronic chime412 to cause the electronic chime to emit thenotification sound430. As such, the printedcircuit board410 may cause thesecond electricity452 to pass through theelectronic chime412 in response to thesecond electricity452 being greater than the first threshold.
Furthermore, the printedcircuit board410 may be described as a first printed circuit board, and thesecurity system202 may comprise a second printed circuit board. Similar to the method illustrated inFIG. 14, the method disclosed inFIG. 15 may further include routing at least a portion of thefirst electricity450 through the second printed circuit board of thesecurity system202. As well, this method may further include configuring the second printed circuit board to block thesecond electricity452 from entering the second printed circuit board of thesecurity system202 in response to the visitor pressing the button. Stated differently, these steps may allow all of the transformer electrical power to be blocked from entering thesecurity system202 and diverted to theelectronic chime412 so that the chime may have enough electrical power to emit thenotification sound430.
Several embodiments include yet another method for using thedoorbell system400. As illustrated inFIG. 16, the method includes obtaining the security system202 (at step900). Similar to the methods illustrated inFIG. 14, many embodiments also include mechanically coupling the printedcircuit board410 to theelectronic chime412 and electrically coupling the printedcircuit board410 to the electronic chime412 (at step902). As well, several embodiments include electrically coupling thesecurity system202 to the printed circuit board410 (at step904). With continued reference toFIG. 15, in response to thesecond electricity452 being greater than the first threshold, many embodiments also include configuring theelectronic switch assembly410 so that theelectronic switch assembly410 causes thesecond electricity452 to pass through theelectronic chime412 to cause theelectronic chime412 to emit the notification sound430 (at step906).
INTERPRETATIONNone of the steps described herein is essential or indispensable. Any of the steps can be adjusted or modified. Other or additional steps can be used. Any portion of any of the steps, processes, structures, and/or devices disclosed or illustrated in one embodiment, flowchart, or example in this specification can be combined or used with or instead of any other portion of any of the steps, processes, structures, and/or devices disclosed or illustrated in a different embodiment, flowchart, or example. The embodiments and examples provided herein are not intended to be discrete and separate from each other.
The section headings and subheadings provided herein are nonlimiting. The section headings and subheadings do not represent or limit the full scope of the embodiments described in the sections to which the headings and subheadings pertain. For example, a section titled “Topic 1” may include embodiments that do not pertain to Topic 1 and embodiments described in other sections may apply to and be combined with embodiments described within the “Topic 1” section.
Some of the devices, systems, embodiments, and processes use computers. Each of the routines, processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code modules executed by one or more computers, computer processors, or machines configured to execute computer instructions. The code modules may be stored on any type of non-transitory computer-readable storage medium or tangible computer storage device, such as hard drives, solid state memory, flash memory, optical disc, and/or the like. The processes and algorithms may be implemented partially or wholly in application-specific circuitry. The results of the disclosed processes and process steps may be stored, persistently or otherwise, in any type of non-transitory computer storage such as, e.g., volatile or non-volatile storage.
The various features and processes described above may be used independently of one another, or may be combined in various ways. All possible combinations and subcombinations are intended to fall within the scope of this disclosure. In addition, certain method, event, state, or process blocks may be omitted in some implementations. The methods, steps, and processes described herein are also not limited to any particular sequence, and the blocks, steps, or states relating thereto can be performed in other sequences that are appropriate. For example, described tasks or events may be performed in an order other than the order specifically disclosed. Multiple steps may be combined in a single block or state. The example tasks or events may be performed in serial, in parallel, or in some other manner. Tasks or events may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described. For example, elements may be added to, removed from, or rearranged compared to the disclosed example embodiments.
Conditional language used herein, such as, among others, “can,” “could,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment. The terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations and so forth. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Conjunctive language such as the phrase “at least one of X, Y, and Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to convey that an item, term, etc. may be either X, Y, or Z. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y, and at least one of Z to each be present.
The term “and/or” means that “and” applies to some embodiments and “or” applies to some embodiments. Thus, A, B, and/or C can be replaced with A, B, and C written in one sentence and A, B, or C written in another sentence. A, B, and/or C means that some embodiments can include A and B, some embodiments can include A and C, some embodiments can include B and C, some embodiments can only include A, some embodiments can include only B, some embodiments can include only C, and some embodiments can include A, B, and C. The term “and/or” is used to avoid unnecessary redundancy.
While certain example embodiments have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions disclosed herein. Thus, nothing in the foregoing description is intended to imply that any particular feature, characteristic, step, module, or block is necessary or indispensable. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions, and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions disclosed herein.